HacKer

Final-073 Resources that Break Through the Sky!

.

Globally, the total number of computer devices infected with the Nemesis virus has exceeded 800 million!

An exaggerated statistic!

The Nemesis Virus was Shi Lei's desperate bargaining chip. It was designed to be extremely extreme by Shi Lei, and he used extremely novel source code hiding methods. Even the world's top hackers would find it difficult to discover the source code of the Nemesis Virus.

Because Shi Lei hid the source code of the Nemesis virus in the system source code!

Although the system source code and the source code of the Nemesis virus cannot be exactly the same, the letters that make up the source code are standard and universal.

Shi Lei designed a new set of syntax to directly call the source code of the operating system to generate the final Nemesis virus, allowing the Nemesis virus to evade all scans, creating a Nemesis virus that is in the computer but not in the computer. the illusion.

Although the Nemesis virus is not a disk-level virus, it can be removed by formatting the hard drive and reinstalling the system.

However, the Nemesis virus is very contagious. Even if the computer system is reinstalled and the Nemesis virus is temporarily eliminated, the environment is filled with the Nemesis virus and you may be infected again anytime and anywhere.

Therefore, even if the Nemesis virus is temporarily eliminated, it will have no effect!

July 14, five minutes past midnight.

Shi Lei was typing on the keyboard quickly. The Nemesis virus had infected so many computer devices, how could Shi Lei waste it?

"Yizur, how long will it take to build a unified botnet?" Shi Lei asked Yizuer.

Constructing more than 800 million computer devices into a huge botnet could be done by Shi Lei alone. That would be an impossible task.

Luckily, Yizuel can do it!

The botnet Shi Lei tried to build was essentially no different from the IWN secret network. However, IWNSeed, the base point of IWN Secret Network, is built into the World of Brave client and is directly accepted by players.

And the basis of the botnet. It’s the Nemesis virus!

So far, the Nemesis virus has not shown any malicious behavior, neither deleting users’ data nor tampering with their applications.

Therefore, the reputation of Nemesis virus is limited to the Internet security community and network hacker community, and among ordinary netizens. Not famous.

After all, ordinary users don't understand what's so powerful about the Nemesis virus. It seems to be harmless at all. It just installs a useless program in the computer system.

Inside the computer system of ordinary users. Are there too many programs that are secretly installed by other software?

"Sir, it will take about 30 minutes to complete the global unified botnet. Please wait. The system is configuring detailed parameters." Yi Zuer responded to Shi Lei.

Even a powerful pseudo-artificial intelligence system like Yi Zuer would still need half an hour to coordinate and process more than 800 million computer devices.

Time passed by minute by second, Shi Lei was not in a hurry. But wait patiently. While waiting, Shi Lei chose a nice name for the globally unified botnet.

ALL-ONE-NET!

AON for short!

Xia's name in Mandarin was named "Yiwang" by Shi Lei, which means "catch them all in one fell swoop".

At 00:36 in the morning, the AON network construction was completed!

The virtual transparent screen of the LIP lens-type information processor shows that the number of users accessing the AON network has reached 838,731,902.

This data is changing anytime and anywhere. Generally speaking, it shows a rapid increasing trend. After all, the Nemesis virus is constantly infecting computer equipment around the world.

Shi Lei looked at the data on the total computing resources of the AON network through the virtual transparent screen of the LIP lens-type information processor. Suddenly, a rich smile appeared on Shi Lei's face.

The total computing resources of the AON network can mobilize up to 11 million Tflops of computing resources without harming most users!

That’s right!

11,000,000tflops!

The computing resources of the AON network are approximately eleven times that of the computing resources obtained by the IWN secret network!

Using the simplest conversion method, it can be inferred that it takes 200 hours for the IWN secret network to scan the global Internet. Then the AON network can complete the scan of the global Internet in less than 20 hours.

However, in fact, the time it takes for the AON network to scan the global Internet does not take 20 hours at all, or even two hours!

Because there are fundamental differences between the AON network and the IWN secret network. The base point of the AON network, that is, the computer equipment infected by the Nemesis virus, has been scanned once by the AON network and is a normal security target, and is excluded from the scanning scope.

Therefore, only computer devices that are not infected by the Nemesis virus are the targets of AON network scanning. In addition, the Nemesis virus is assisting and infecting more computer devices. How can it take such a long scanning time? ?

According to Shi Lei's estimation, in two hours at most, the base points that make up the AON network will exceed 1.2 billion data. By then, the computing resources of the AON network have skyrocketed again, and the number of suspected targets around the world has plummeted. There are not many targets that require Shi Lei to explore personally.

"Yizur, optimize the computing resources of the AON network!" Shi Lei ordered Yizuer to start optimizing to reduce latency based on the distribution of computing resources in the AON network.

Shi Lei turned to look at Tao Wenxian and Raphael and asked, "Have you found anything? How many unknown IP addresses are there in the backlog?"

Raphael took the initiative to answer: "Nothing has been found yet! There is a backlog of more than a thousand unknown IP addresses, and we are processing them quickly."

"Forget it, let me do it!" Shi Lei didn't say anything more. He controlled the computing resources of the AON network. With the assistance of Yi Zuer, he began to scan the unknown IP addresses found in the needle-in-a-haystack plan.

The AON network gathers more than 11 million Tflops of computing resources, and it is increasing rapidly every minute and every second. When Shi Lei controlled the computing resources of the AON network and began to deal with the needle-in-a-haystack plan and discovered the unknown-level IP address, he had accumulated more than More than 1,000 unknown-level IP address records were quickly identified.

Tao Wenxie and Raphael looked a little dazed!

Although the two of them understood that Shi Lei must have done something earth-shattering, the current situation seemed a bit too exaggerated?

Tao Wenxian couldn't help but ask: "Brother Shitou, what exactly did you do?"

Shi Lei snapped his fingers and ordered: "Yizur, share the information!"

Yizuer immediately shared the AON network information with Raphael and Tao Wenxian through the virtual transparent screen of the LIP lens information processor.

The two of them looked at the AON network, which gathered more than 11 million Tflops of computing resources, and were stunned!

Isn't this an illusion?

Especially Raphael, who has become the world's top hacker longer than Tao Wenxian, and he knows more 'common sense' information.

Among the world's top 500 supercomputers announced in June 2008, the top-ranked supercomputer is a supercomputer named Roadrunner manufactured by IBM.

This supercomputer named after the ‘Clown in the Desert’ has a stable computing speed of 1026tflops and a peak computing speed of .

The computing resources gathered by the AON network are equivalent to more than 10,000 supercomputers, the world's number one supercomputer. Although it is only a loosely distributed computing resource, that level of computing resources is still terrifying!

"Raphael, am I hallucinating?" Tao Wenxian said involuntarily.

Raphael shook his head, and then flicked Tao Wenxian's eyebrows, "If you are hallucinating, I must be hallucinating too. However, I think we are definitely not hallucinating."

Having said this, Raphael looked at Shi Lei and asked, "Stone, this is..."

Shi Lei nodded and affirmed: "Yes! This is the super virus I created! A super virus that simulates IWNSeed. With these computing resources, we can discover the real IP address of Butler's parent server before dawn!"

Tao Wenxian swallowed, "Then we still carry out the plan of finding a needle in a haystack?"

Shi Lei glanced at Tao Wenxian. He knew what Tao Wenxian meant, which was that he wanted to act together with the AON network instead of continuing to implement the plan of finding a needle in a haystack.

However, according to the current situation, the needle-in-a-haystack plan can indeed be suspended and the AON network will perform the remaining tasks.

"Let's control the AON network operations together!" Shi Lei said.

Tao Wenxian nodded excitedly, "Great, Brother Shitou, we won't have to wait too long to find Butler!"

The three first integrated the IWN secret network and the AON network to form a cluster of distributed computing networks, and then mobilized all computing resources to scan the Internet space that had not yet been scanned.

Yi Zuer gave an estimate of the time, and it would only take up to one hour to complete the scan of the global Internet. At that point, 99.9 percent of the network's IP addresses will be excluded.

The remaining target is Butler's hiding place!

This time, it was absolutely impossible for Butler to escape again. After all, the plan implemented by Shi Lei was to find a needle in a haystack. Shi Lei had turned the entire Internet world upside down. Could it be that Butler still couldn't be found?

That's absolutely impossible!

No matter how good Butler's hiding ability is, he can't escape Shi Lei's search!

.(To be continued ~^~)

Chapter 1872/1926
97.20%
HacKerCh.1872/1926 [97.20%]